ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)
http://airccse.org/journal/ijnsa.html
SECURE KEY MANAGEMENT PROTOCOL IN WIMAX
Noudjoud Kahya1, Nacira Ghoualmi2, Pascal Lafourcade3
1, 2LRS Laboratory; Badji Mokhtar University, Annaba, Algeria
3 VERIMAG Laboratory; Joseph Fourier University, Grenoble, France.
ABSTRACT
The Worldwide Interoperability for Microwave Access (WIMAX /IEEE 802.16), is new technology based on wireless metropolitan area network. Security of connections access in WIMAX /IEEE 802.16 is complete with respect to the Privacy Key Management (PKM) protocol. The protocol is responsible for providing the secure distribution of keying data from Base Station (BS) to Subscriber Station (SS). In this paper we provide the formal analysis of PKMv2 using Scyther tool to verify the security properties. We found that PKMv2 is vulnerable to replay, DoS, Man-in-the middle attacks. At last we have proposed a secure protocol (SPKM) to prevent the authorization protocol from such attacks.
Original Source URL: http://airccse.org/journal/nsa/1112nsa09.pdf
Volume Link: http://airccse.org/journal/jnsa12_current.html
http://airccse.org/journal/ijnsa.html
SECURE KEY MANAGEMENT PROTOCOL IN WIMAX
Noudjoud Kahya1, Nacira Ghoualmi2, Pascal Lafourcade3
1, 2LRS Laboratory; Badji Mokhtar University, Annaba, Algeria
3 VERIMAG Laboratory; Joseph Fourier University, Grenoble, France.
ABSTRACT
The Worldwide Interoperability for Microwave Access (WIMAX /IEEE 802.16), is new technology based on wireless metropolitan area network. Security of connections access in WIMAX /IEEE 802.16 is complete with respect to the Privacy Key Management (PKM) protocol. The protocol is responsible for providing the secure distribution of keying data from Base Station (BS) to Subscriber Station (SS). In this paper we provide the formal analysis of PKMv2 using Scyther tool to verify the security properties. We found that PKMv2 is vulnerable to replay, DoS, Man-in-the middle attacks. At last we have proposed a secure protocol (SPKM) to prevent the authorization protocol from such attacks.
Original Source URL: http://airccse.org/journal/nsa/1112nsa09.pdf
Volume Link: http://airccse.org/journal/jnsa12_current.html
No comments:
Post a Comment